ngocminhta / GraduationExamScoreProcessingLinks
National Graduation Exam Score from 2022 to 2024
☆11Updated last year
Alternatives and similar repositories for GraduationExamScoreProcessing
Users that are interested in GraduationExamScoreProcessing are comparing it to the libraries listed below
Sorting:
- ☆10Updated last year
- A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features …☆17Updated 7 months ago
- A powerful and flexible Python-based network scanning framework. Inspired by Nmap, designed to combine simplicity and effectiveness for b…☆31Updated 3 weeks ago
- Distributed Computing Interaction Framework: Optimizing the algorithm with the Server-Worker model☆17Updated last year
- A web application dedicated to write sysmon configuration file☆12Updated last month
- Codebase for challenges in VHC_CTF_2023☆18Updated 2 years ago
- CTF Scoreboard Archive is a web app for storing and displaying CTF scoreboards, supporting links (CTFd, rCTF), MHTML uploads, and GIF gen…☆12Updated last year
- Cybersecurity research results. Simple C/C++ and Python implementations☆283Updated last week
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆78Updated 2 years ago
- This project detects malicious or abnormal traffic in industrial control networks, visualizes network topology, and identifies compromise…☆12Updated 9 months ago
- My collection of malware dev links☆301Updated 6 months ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆748Updated 10 months ago
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆107Updated last month
- Fork repository for CryptoCat's "Binary Exploitation 101 Course" AKA "Practical Buffer Overflow Exploitation"☆22Updated 3 years ago
- BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).☆478Updated 2 months ago
- ☆374Updated 2 years ago
- Reverse Engineering challenges☆36Updated 4 years ago
- Centralized resource for listing and organizing known injection techniques and POCs☆662Updated last week
- Collection of Windows Privilege Escalation (Analyse/PoC/Exploit)☆465Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆423Updated 6 months ago
- Official writeups for University CTF 2023: Brains & Bytes☆105Updated last year
- Useful scripts to exploit Hack The Box retired machines/challenges☆57Updated 5 months ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆225Updated 8 months ago
- ☆259Updated last year
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆257Updated 3 months ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆109Updated 3 years ago
- ☆15Updated last year
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆219Updated last year
- 🧞♂️ malware analysis☆37Updated last year
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆158Updated 4 months ago